[HTML][HTML] Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions

JPA Yaacoub, HN Noura, O Salman - Internet of Things and Cyber-Physical …, 2023 - Elsevier
Abstract Federated Learning (FL, or Collaborative Learning (CL)) has surely gained a
reputation for not only building Machine Learning (ML) models that rely on distributed …

Temporal dynamics-aware adversarial attacks on discrete-time dynamic graph models

K Sharma, R Trivedi, R Sridhar, S Kumar - Proceedings of the 29th ACM …, 2023 - dl.acm.org
Real-world graphs such as social networks, communication networks, and rating networks
are constantly evolving over time. Many deep learning architectures have been developed …

Low-epsilon adversarial attack against a neural network online image stream classifier

HM Arjomandi, M Khalooei, M Amirmazlaghani - Applied Soft Computing, 2023 - Elsevier
An adversary intercepts a stream of images between a sender and a receiver neural network
classifier. To minimize its footprint, the adversary only attacks a limited number of images …

Poisoning generative replay in continual learning to promote forgetting

S Kang, Z Shi, X Zhang - International Conference on …, 2023 - proceedings.mlr.press
Generative models have grown into the workhorse of many state-of-the-art machine learning
methods. However, their vulnerability under poisoning attacks has been largely …

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

D Lunghi, A Simitsis, O Caelen… - Proceedings of the Second …, 2023 - dl.acm.org
Data economy relies on data-driven systems and complex machine learning applications
are fueled by them. Unfortunately, however, machine learning models are exposed to …

Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense

BM Le, S Tariq, SS Woo - Proceedings of the Asian …, 2024 - openaccess.thecvf.com
Deep neural networks, particularly in vision tasks, are notably susceptible to adversarial
perturbations. To overcome this challenge, developing a robust classifier is crucial. In light of …

Accelerating adversarial attack using process-in-memory architecture

S Liu, S Bavikadi, T Sen, H Shen… - … on Mobility, Sensing …, 2022 - ieeexplore.ieee.org
Recent research has demonstrated that machine learning algorithms are vulnerable to
adversarial attacks, in which small but carefully crafted input perturbations can lead to …

Limited budget adversarial attack against online image stream

HM Arjomandi, M Khalooei… - ICML 2021 Workshop on …, 2021 - openreview.net
An adversary wants to attack a limited number of images within a stream of known length to
reduce the exposure risk. Also, the adversary wants to maximize the success rate of the …

Low-epsilon adversarial attack against a neural network online image stream classifier

H Mohasel Arjomandi, M Khalooei, M Amirmazlaghani - 2023 - dl.acm.org
An adversary intercepts a stream of images between a sender and a receiver neural network
classifier. To minimize its footprint, the adversary only attacks a limited number of images …

[PDF][PDF] Interpretable Machine Learning (IML) Methods: Classification and Solutions for Transparent Models

AG Tehrani - 2024 - uwspace.uwaterloo.ca
This thesis explores the realm of machine learning (ML), focusing on enhancing model
interpretability called interpretable machine learning (IML) techniques. The initial chapter …